Notes & Bookmarks¶
Add timestamped annotations to your sessions for later review.
Quick Notes During Shell Sessions¶
While inside pentlog shell, use keyboard shortcuts:
| Hotkey | Action | Description |
|---|---|---|
Ctrl+N |
Quick Note | Add a one-line note instantly |
Ctrl+G |
Quick Vuln | Log a vulnerability with severity |
Adding a Quick Note¶
Press Ctrl+N:
Logging a Vulnerability¶
Press Ctrl+G:
🔓 Vuln title: SQL Injection in login form
Severity (c/h/m/l/i): h
Description (optional): POST /login endpoint vulnerable to blind SQLi
✓ Vuln saved: V-abc123 [High] SQL Injection in login form
Severity levels:
| Code | Level | Description |
|---|---|---|
c |
Critical | Immediate action required |
h |
High | Significant risk |
m |
Medium | Moderate risk |
l |
Low | Minor issue |
i |
Info | Informational |
Managing Notes¶
List Notes¶
Works both: - Inside shell: Shows current session notes - Offline: Interactive selector for past sessions
Add Note Manually¶
View Vulnerabilities¶
Shows all logged vulnerabilities with: - Severity indicators - Timestamps - Descriptions - IDs for reference
Note Format¶
Notes are stored with:
{
"timestamp": "2026-02-20T14:05:43Z",
"session_id": 42,
"type": "note",
"content": "Found open port 8080",
"command_context": "nmap -sV 10.0.0.5"
}
Vulnerability Format¶
{
"id": "V-abc123",
"timestamp": "2026-02-20T14:10:22Z",
"session_id": 42,
"type": "vulnerability",
"title": "SQL Injection in login form",
"severity": "high",
"description": "POST /login endpoint vulnerable to blind SQLi",
"evidence": "sqlmap output showing injection point"
}
Best Practices¶
Note Early, Note Often
Add notes immediately when you find something interesting. Don't rely on memory.
Use Consistent Severity
Be consistent with severity ratings for easier prioritization later.
Include Context
When adding manual notes, include enough context to understand the finding later.
Good Note Examples
- "Port 8080 open — Apache Tomcat 9.0"
- "Found .git directory exposed"
- "Admin panel at /admin with default creds"
Exporting Notes¶
Notes are automatically included in reports:
The exported report includes: - All notes with timestamps - All vulnerabilities with severity - Command context for each note - Links to relevant session sections